Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-12-2023 23:09

General

  • Target

    951e010135faf3ca45798525c72604e1.exe

  • Size

    662KB

  • MD5

    951e010135faf3ca45798525c72604e1

  • SHA1

    f106af50aff505166b692d5a8836186a00bee470

  • SHA256

    632f1076c26e60139620745b9876c89828c782d626122cef3ae1d775381fe79f

  • SHA512

    4f9fb4f8b6a4fda8d1e1cd2856909cf3f55f016bce0e2da116c3cc58a08616c93ca8ee65af6b773133544087a77a7bf9ceb0d5f8906c47e0284bf9f32f13defa

  • SSDEEP

    12288:fKRhCuP9R1TeCy9zjVhQN3eMwEK72Yf4ZQPdLdxFVbh8ougIn:GjP9R1TeJ2N3exL72Yf2QPxdy

Score
10/10

Malware Config

Extracted

Family

vidar

Version

39.7

Botnet

706

C2

https://shpak125.tumblr.com/

Attributes
  • profile_id

    706

Signatures

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar Stealer 4 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\951e010135faf3ca45798525c72604e1.exe
    "C:\Users\Admin\AppData\Local\Temp\951e010135faf3ca45798525c72604e1.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 888
      2⤵
      • Program crash
      PID:2164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2908-1-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB

  • memory/2908-3-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2908-2-0x0000000001CB0000-0x0000000001D4D000-memory.dmp

    Filesize

    628KB

  • memory/2908-43-0x0000000000400000-0x00000000004C0000-memory.dmp

    Filesize

    768KB

  • memory/2908-65-0x0000000001CB0000-0x0000000001D4D000-memory.dmp

    Filesize

    628KB

  • memory/2908-64-0x00000000002B0000-0x00000000003B0000-memory.dmp

    Filesize

    1024KB